ISB FIELD TRIP MINUTES - 10-11 DECEMBER 1987

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90G01353R000200180023-0
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
62
Document Creation Date: 
December 27, 2016
Document Release Date: 
July 2, 2012
Sequence Number: 
23
Case Number: 
Publication Date: 
February 24, 1988
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP90G01353R000200180023-0.pdf2.47 MB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2012/07/02: CIA-RDP90GO1353R000200180023-0 STAT STAT ROUTING AND RECORD SHEET SUBJECT: (Optional) ISB Field Trip Minutes - 10-11 December 1987 FROM: EXTENSION NO. ER 0801-88 SA E XD I R 7E12 HQS DATE 24 February 1988 TO: -(Officer designation, room number, and building) DATE RECEIVED FORWARDED OFFICER'S INITIALS COMMENTS (Number each comment to show from whom to whom. Draw a line across column offer each comment.) 1. Executive Registry 7E12 HQS 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. E) I - L 1 1 CI - i jJ 6 R EC FORM 610 USED PREVIOUS I-79 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 ER 0801-88 24 February 1988 MEMORANDUM FOR: Information Systems Board STAT FROM: Special Assistant to the,Executive Director SUBJECT: ISB Field Trip Minutes - 10-11 December 1987 1. ice President for Engineering and Scientific Computing within IBM's Data Systems Division, described his company's strategy for supercomputers. Copies of his presentation slides are not available as originally promised. During the discussion, expressed interest in pursuing other potential applications for special purpose processors in IBM mainframes, such as text processing. A follow-up meeting has been arranged at the working level. A copy of a paper written by Fred Brooks, titled "No Silver Bullets," is attached. 2.I IIBM Director of Engineering and Technology, described his company's plans for personal computers. 3. Consultant for Computing Systems at the IBM Watson Research Lab, discussed the implications for central services-posed by large-scale interactive computing in the workplace. Additional copies of his handouts are available. 4. The Board met with Chairman of Citicorp's Corporate Technical Committee. Citicorp and the Agency are dealing with many of the same issues related to the management of information technology. 5. The Board met with NYNEX. . 6. I f IBM's Corporate Information Systems described how IBM links its internal investment in data processing to its overall business strategy. A copy of his presentation slides is attached. STAT STAT STAT STAT STAT STAT STAT STAT Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 STAT SUBJECT: ISB Field Trip Minutes - 10-11 December 1987 DCI/EXDIRI I(24 Feb 88) Distribution: Orig - Each Addressee 1 - ER 1 - ISB File Declassified in Part - Sanitized Copy Approved for Release 2012/07/02: CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Essence and Accidents of Softwaie Engineering Frederick P. Brooks, Jr. University of North Carolina at Chapel Hill Fashioning complex conceptual constructs is the essence; accidental tasks arise in representing the constructs in language. Past progress has so reduced the accidental tasks that future progress now depends upon addressing the essence. Of all the monsters that fill the nightmares of our folklore, none terrify more than werewolves, because they transform unexpectedly from the familiar into horrors. For these, one seeks bullets of silver that can magic- ally lay them to rest. The familiar software project, at least as seen by the nontechnical manager, has something of this character; it is usually in- nocent and straightforward, but is capable of becoming a monster of missed sched- ules, blown budgets, and flawed products. So we hear desperate cries for a silver bullet-something to make software costs drop as rapidly as computer hardware costs do. But, as we look to the horizon of a decade hence, we see no silver bullet. There is no single development, in either technology or in management technique, that by itself promises even one order-of- magnitude improvement in productivity, in reliability, in simplicity. In this article, I shall try to show why, by examining both the nature of the software problem and the properties of the bullets proposed. Skepticism is not pessimism, however. Although we see no startling break- This article was first published in information P oce - ing '86. ISBN No. 0-444-70077-3, H.-J. Kugler, ed., Elsevier Science Publishers B.V. (North-Holland) IFIP 1986. throughs-and indeed, I believe such to be inconsistent with the nature of soft- ware-many encouraging innovations are under way. A disciplined, consistent effort to develop, propagate, and exploit these innovations should indeed yield an order- of-magnitude improvement. There is no royal road, but there is a road. The first step toward the management of disease was replacement of demon theories and humours theories by the germ theory. That very step, the beginning of hope, in itself dashed all hopes of magical solutions. It told workers that progress would be made stepwise, at great effort, and that a persistent, unremitting care would have to be paid to a discipline of cleanliness. So it is with software engi- neering today. Does it have to be hard?-Essential difficulties Not only are there no silver bullets now in view, the very nature of software makes it unlikely that there will be any-no in- ventions that will do for software prod- uctivity, reliability, and simplicity what electronics, transistors, and large-scale integration did for computer hardware. Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 We cannot expect ever to see twofold gains every two years. First, one must observe that the anom- aly is not that software progress is so slow, but that computer hardware progress is so fast. No other technology since civilization began has seen six orders of magnitude in performance-price gain in 30 years. In no other technology can one choose to take the gain in either improved performance or in reduced costs. These gains flow from the transformation of computer manufac- ture from an assembly industry into a pro- cess industry. Second, to see what rate of progress one can expect in software technology, let us examine the difficulties of that tech- nology. Following Aristotle, I divide them into essence, the difficulties inherent in the nature of software, and accidents, those difficulties that today attend its produc- tion but are not inherent. The essence of a software entity is a con- struct of interlocking concepts: data sets, relationships among data items, algo- rithms, and invocations of functions. This essence is abstract in that such a concep- tual construct is the same under many dif- ferent representations. It is nonetheless highly precise and richly detailed. I believe the hard part of building soft- ware to be the specification, design, and testing of this conceptual construct, not the labor of representing it and testing the fidelity of the representation. We still make syntax errors, to be sure; but they are fuzz compared with the conceptual errors in most systems. If this is true, building software will always be hard. There is inherently no silver bullet. Let us consider the inherent properties of this irreducible essence of modern soft- ware systems: complexity, conformity, changeability, and invisibility. Complexity. Software entities are more complex for their size than perhaps any other human construct because no two parts are alike (at least above the statement level). If they are, we make the two similar parts into a subroutine-open or closed. In this respect, software systems differ profoundly from computers, buildings, or automobiles, where repeated elements abound. Digital computers are themselves more complex than most things people build: They have very large numbers of states. This makes conceiving, describing, and testing them hard. Software systems have '.R I April 1987 orders-of-magnitude more states than computers do. Likewise, a scaling-up of a software en- tity is not merely a repetition of the same elements in larger sizes, it is necessarily an increase in the number of different ele- ments. In most cases, the elements interact with each other in some nonlinear fashion, and the complexity of the whole increases much more than linearly. The complexity of software is an essen- tial property, not an accidental one. Hence, descriptions of a software entity that abstract away its complexity often abstract away its essence. For three cen- turies, mathematics and the physical sciences made great strides by constructing simplified models of complex phenomena, deriving properties from the models, and verifying those properties by experiment. This paradigm worked because the com- plexities ignored in the models were not the essential properties of the phenomena. It does not work when the complexities are the essence. Many of the classic problems of devel- oping software products derive from this essential complexity and its nonlinear in- creases with size. From the complexity comes the difficulty of communication among team members, which leads to product flaws, cost overruns, schedule delays. From the complexity comes the difficulty of enumerating, much less understanding, all the possible states of the program, and from that comes the unreliability. From complexity of function comes the difficulty of invoking function, which makes programs hard to use. From complexity of structure comes the diffi- culty of extending programs to new func- tions without creating side effects. From complexity of structure come the un- visualized states that constitute security trapdoors. Not only technical problems, but management problems as well come from the complexity. It makes overview hard, thus impeding conceptual integrity. It makes it hard to find and control all the loose ends. It creates the tremendous learning and understanding burden that makes personnel turnover a disaster. Conformity. Software people are not alone in facing complexity. Physics deals Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 CIA-RDP90G01353R000200180023-0 with terribly complex objects even at the "fundamental" particle level. The phys- icist labors on, however, in a firm faith that there are unifying principles to be found, whether in quarks or in unified- field theories. Einstein argued that there must be simplified explanations of nature, because God is not capricious or arbitrary. . No such faith comforts the software en- gineer. Much of the complexity that he must master is arbitrary complexity, forced without rhyme or reason by the many human institutions and systems to which his interfaces must conform. These differ from interface to interface, and from time to time, not because of necessity but only because they were designed by different people, rather than by God. In many cases, 'the software must con- form because it is the most recent arrival on the scene. In others, it must conform because it is perceived as the most conformable. But in all cases, much com- plexity comes from conformation to other interfaces; this complexity cannot be simplified out by any redesign of the soft- ware alone. Changeability. The software entity is constantly subject to pressures for change. Of course, so are buildings, cars, com- puters. But manufactured things are infre- quently changed after manufacture; they are superseded by later models, or essen- tial changes are incorporated into later- serial-number copies of the . same basic design. Call-backs of automobiles are really quite infrequent; field changes of computers somewhat less so. Both are much less frequent than modifications to fielded software. In part, this is so because the software of a system embodies its function, and the function is the part that most feels the pressures of change. In part it is because software can be changed more easily-it is pure thought-stuff, infinitely malleable. Buildings do in fact get changed, but the high costs of change, understood by all, serve to dampen the whims of the changers. All successful software gets changed. Two processes are at work. First, as a soft- ware product is found to be useful, people try it in new cases at the edge of or beyond the original domain. The pressures for ex- tended function come chiefly from users who like the basic function and invent new uses for it. Second, successful software survives beyond the normal fife of the machine vehicle for which it is first written. If not new computers, then at least new disks, new displays, new printers come along; and the software must be conformed to its new vehicles of opportunity. In short, the software product is embed- ded in a cultural matrix of applications, users, laws, and machine vehicles. These all change continually, and their changes inexorably force change upon the software product. Invisibility. Software is invisible and un- visualizable. Geometric abstractions are powerful tools. The floor plan of a build- ing helps both architect and client evaluate spaces, traffic flows, views. Contra- dictions and omissions become obvious. Despite progress in restricting and simplifying software structures, they remain inherently unvisualizable, and thus do not permit the mind to use some of its most powerful conceptual tools. lack not only impedes the process of design within one mind, it severely hinders communication among minds. Past breakthroughs solved accidental difficulties If we examine the three steps in soft- ware-technology development that have been most fruitful in the past, we discover that each attacked a different major dif- ficulty in building software, but that those difficulties have been accidental, not essential, difficulties. We can also see the natural limits to the extrapolation of each such attack. High-level languages. Surely the most powerful stroke for software productivity, reliability, and simplicity has been the pro- gressive use of high-level languages for programming. Most observers credit that development with at least a factor of five in productivity, and with concomitant gains in reliability, simplicity, and com- prehensibility. What does a high-level language ac- complish? It frees a program from much of its accidental complexity. An abstract Scale drawings of mechanical parts and stick-figure models of molecules, al- though abstractions, serve the same pur- pose. A geometric reality is captured in a geometric abstraction. The reality of software is not inherently embedded in space. Hence, it has no ready geometric representation in the way that land has maps, silicon chips have dia- grams, computers. have connectivity schematics. As soon as we attempt to dia- gram software structure, we find it to con- stitute not one, but several, general directed graphs superimposed one upon another. The several graphs may represent the flow of control, the flow of data, pat- terns of dependency, time sequence, name-space relationships. These graphs are usually not even planar, much less hierarchical. Indeed, one of the ways of establishing conceptual control over such structure is to enforce link cutting until one or more of the graphs becomes hierar- chical. I In spite of progress in restricting and simplifying the structures of software, they remain inherently unvisualizable, and thus do not permit the mind to use some of its most powerful conceptual tools. This program consists of conceptual con- structs: operations, data types, sequences, and communication. The concrete ma- chine program is concerned with bits, reg- isters, conditions, branches, channels, disks, and such. To the extent that the high-level language embodies the con- structs one wants in the abstract program and avoids all lower ones, it eliminates a whole level of complexity that was never inherent in the program at all. The most a high-level language can do is to furnish all the constructs that the pro- grammer imagines in the abstract pro- gram. To be sure, the level of our thinking about data structures, data types, and operations is steadily rising, but at an ever- decreasing rate. And language devel- opment approaches closer and closer to the sophistication of users. Moreover, at some point the elabora- tion of a high-level language creates a tool- mastery burden that increases, not re- duces, the intellectual task of the user who rarely uses the esoteric constructs. Time-sharing. Time-sharing brought a major improvement in the productivity of programmers and in the quality of their product, although not so large as that Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 brought by high-level languages. Time-sharing attacks a quite different difficulty. Time-sharing preserves im- mediacy, and hence enables one to main- tain an overview of complexity. The slow turnaround of batch programming means that one inevitably forgets the minutiae, if not the very thrust, of what one was think- ing when he stopped programming and called for compilation and execution. This interruption is costly in time, for one must refresh one's memory. The most serious effect may well be the decay of the grasp of all that is going on in a complex system. Slow turnaround, like machine-lan- guage complexities, is an accidental rather than an essential difficulty of the software process. The limits of the potential con- tribution of time-sharing derive directly. The principal effect of time-sharing is to shorten system response time. As this response time goes to zero, at some point it passes the human threshold of noticeabil- ity, about 100 milliseconds. Beyond that threshold, no benefits are to be expected. a- )l- -e- ho to of eir iat Unified programming environments. Unix and Interlisp, the first integrated pro- gramming environments to come into widespread use, seem to have improved productivity by integral factors. Why? They attack the accidental difficulties that result from using individual programs together, by providing integrated libraries, unified file formats, and pipes and filters. As a result, conceptual structures that in principle could always call, feed, and use one another can indeed. easily do so in practice. This breakthrough in turn stimulated the development of whole toolbenches, since each new tool could be applied to any programs that used the standard formats. Because of these successes, environ- ments are the subject of much of today's software-ngineering research. We look at their promise and limitations in the next section. Hopes for the silver Now let us consider the technical devel- opments that are most often advanced as potential silver bullets. What problems do they address-the problems of essence, or the remaining accidental difficulties? Do they offer revolutionary advances, or in- cremental ones? Ada and other high-level language ad- vances. One of the most touted recent de- ER I April 1987 To slay the werewolf Why a silver bullet? Magic, of course. Silver Is identified with the moon and thus has magic properties. A silver bullet offers the fastest, most powerful, and safest way to slay the fast, powerful, and incredibly dangerous werewolf. And what could be more natural than using the moon-metal to destroy a creature transformed under the light of the full moon? The legend of the werewolf Is probably one of the oldest monster legends around. Herodotus in the fifth century BC gave us the first written report of werewolves when he mentioned a tribe north of the Black Sea, called the Neuri, who supposedly turned Into wolves a few days each year. Herodotus wrote that he didn't believe It. Sceptics aside, many people have believed in people turning Into wolves or other animals. In medieval Europe, some people were killed because they were thought to be werewolves. In those times, It didn't take being bitten by a werewolf to become one. A bargain with the devil, using a special potion, wearing a special belt, or being cursed by a witch could all turn a person into a werewolf. However, medieval werewolves could be hurt and killed by normal weapons. The problem was to overcome their strength and cunning. Enter the fictional, not legendary, werewolf. The first major werewolf movie, The Werewolf of London, in 1935 created the two-legged man-wolf who changed into a monster when the moon was full. He became a werewolf after being bitten by one, and could be killed only with a silver bullet. Souna familiar? Actually, we owe many of today's Ideas about werewolves to Lon Chaney Jr.'s unforgettable 1941 portrayal in The Wolf Man. Subsequent films seldom strayed far from the mythology of the werewolf shown In that movie. But that movie strayed far from the original mythology of the werewolf. Would you believe that before fiction took over the legend, werewolves weren't troubled by silver bullets? Vampires were the ones who couldn't stand them. Of course, If you rely on the legends, your only salvation if unarmed and attacked by a werewolf is to climb an ash tree or run into a field of rye. Not so easy to find In an urban setting, and hardly recognizable to the average movie audience. What should you watch out for? People whose eyebrows grow together, whose Index finger is longer than the middle finger, and who have hair growing on their palms. Red or black teeth are a definite signal of possible trouble. Take warning, though. The same symptoms mark people suffering from hyper- trichosis (people born with hair covering their bodies) or porphyria. In porphyria, a person's body produces toxins called porphyrins. Consequently, light becomes painful, the skin grows hair, and the teeth may turn red. Worse for the victim's reputation, his or her increasingly bizarre behavior makes people even more suspicious of the other symptoms. It seems very likely that the sufferers of this disease unwittingly contributed to the current legend, although in earlier times they were evidently not accused of murderous tendencies. It is worth noting-hat the film tradition often makes the werewolf a rather sym- pathetic character, an innocent transformed against his (or rarely, her) will into a Even a man who is pure at heart, And says his prayers at night, Can become a wolf when the wolfbane blooms, And the moon is full and bright. -Nancy Hays Assistant Editor Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 velopments is Ada, a general-purpose high-level language of the 1980's. Ada not only reflects evolutionary improvements in language concepts, but indeed em- bodies features to encourage modern design and modularization. Perhaps the Ada philosophy is more of an advance than the Ada language, for it is the philosophy of modularization, of abstract data types, of hierarchical structuring. Ada is over-rich, a natural result of the process by which requirements were laid on its design. That is not fatal, for sub- setted working vocabularies can solve the learning. problem, and hardware advances will give us the cheap MIPS to pay for the compiling costs. Advancing the structur- ing of software systems is indeed a very good use for the increased MIPS our dollars will buy. Operating systems, loudly decried in the 1960's for their memory and cycle costs, have proved to be an excellent form in which to use some of the MIPS and cheap memory bytes of the past hard- ware surge. Nevertheless, Ada will not prove to be the silver bullet that slays the software which should be hidden. Examples- Ada packages (with private types) and Modula's modules. Hierarchical types, such as Simula-67's classes, allow one to define general in- terfaces that can be further refined by pro- viding subordinate types. The two con- cepts are orthogonal-one may have hierarchies without hiding and hiding without hierarchies. Both concepts repre- sent real advances in the art of building software. Each removes yet another accidental difficulty from the process, allowing the designer to express the essence of the design without having to express large amounts of syntactic material that add no Many students of the art hold out more hope for object-oriented programming than for other technical fads of the day. productivity monster. It is, after all, just another high-level language, and the big- gest payoff from such languages came from the first transition-the transition up from the accidental complexities of the machine into the more abstract statement of step-by-step solutions. Once those ac- cidents have been removed, the remaining ones will be smaller, and the payoff from their removal will surely be less. I predict that a decade from now, when the effectiveness of Ada is assessed, it will be seen to have made a substantial dif- ference, but not because of any particular language feature, nor indeed because of all of them combined. Neither will the new Ada environments prove to be the cause of the improvements. Ada's greatest contri- bution will be that switching to it occa- sioned training programmers in modern software-design techniques. Object-oriented programming. Many students of the art hold out more hope for object-oriented programming than for any of the other technical fads of the day. 2 lam among them. Mark Sherman of Dart- mouth notes on CSnet News that one must be careful to distinguish two separate ideas that go under that name: abstract data types and hierarchical types. The concept of the abstract data type is that an object's type should be defined by a name, a set of proper values, and a set of proper opera- tions rather than by its storage structure, information content. For both abstract types and hierarchical types, the result is to remove a higher-order kind of accidental difficulty and allow a higher-order expres- sion of design. Nevertheless, such advances can do no more than to remove all the accidental dif- ficulties from the expression of the design. The complexity of the design itself is essen- tial, and such attacks make no change whatever in that. An order-of-magnitude gain can be made by object-oriented pro- gramming only if the unnecessary type- specification underbrush still in our pro- gramming language is itself nine-tenths of the work involved in designing a program product. I doubt it. Artificial Intelligence. Many people ex- pect advances in artificial intelligence to provide the revolutionary breakthrough that will give order-of-magnitude gains in software productivity and quality.3 I do not. To see why, we must dissect what is meant by "artificial intelligence." D.L. Parnas has clarified the termi- nological chaos ? : Two quite different definitions of Al are in common use today. AI-l: The use of computers to solve problems that previously could only be solved by apply- ing human intelligence. AI-2: The use of a specific set of programming techniques known as heuristic or rule-based pro- of Alai e. what iilding mean- e'definition lem, we ....6of . it as AI any more.... Unfortiinatdy'I cannot iden- tify a body of technology that is unique to this field.... Most of the work is prob- lem-specifc, and_ some abstraction or creativity is required to'see how to transfer it. I agree completely with this critique. The techniques used for speech recog- nition seem to have little in common with those used for image recognition, and both are different from those used in expert systems. I have a hard time seeing how image recognition, for example, will make any appreciable difference in pro- gramming practice. The same problem is true of speech recognition. The hard thing about building software is deciding what one wants to say, not saying it. No facilita- tion of expression can give more than mar- ginal gains. Expert-systems technology, AI-2, deserves a section of its own. Expert systems. The most advanced part of the artificial intelligence art, and the most widely applied, is the technology for building expert systems. Many soft- ware scientists are hard at work applying this technology to the software-building environment. 3,5 What is the concept, and what are the prospects? An expert system is a program that contains a generalized inference engine and a rule base, takes input data and assumptions, explores the inferences derivable from the rule base, yields conclusions and advice, and offers to explain its results by retracing its reasoning for the user. The inference engines typ- ically can deal with fuzzy or probabilistic data and rules, in addition to purely deter- ministic logic. Such systems offer some clear advan- tages over programmed algorithms designed for arriving at the same solutions to the same problems: ? Inference-engine technology is devel- oped in an application-independent way, and then applied to many uses. One can justify much effort on the in- ference engines. Indeed, that technology is well advanced. ? The changeable parts of the application-peculiar materials are en- Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 tn- ,ns Mns .,el- Mt es. in- nat the en- coded in the rule base in a uniform fashion, and tools are provided for developing, changing, testing, and documenting the rule base. This reg- ularizes much of the complexity of the application itself. The power of such systems does not come from ever-fancier inference mecha- nisms, but rather from ever-richer knowl- edge bases that reflect the real world more accurately. I believe that the most impor- tant advance offered by the technology is the separation of the application complex- ity from the program itself. How can this technology be applied to the software-engineering task? In many ways: Such systems can suggest interface rules, advise on testing strategies, remem- ber bug-type frequencies, and offer opti- mization hints. Consider an imaginary testing advisor, for example. In its most rudimentary form, the diagnostic expert system is very like a pilot's checklist, just enumerating suggestions as to possible causes of diffi- culty. As more and more system structure is embodied in the rule base, and as the rule base takes more sophisticated account of the trouble symptoms reported, the testing advisor becomes more and more particular in the hypotheses it generates and the tests it recommends. Such an expert system may depart most radically from the conventional ones in that its rule base should probably be hierarchically modularized in the same way the corre- sponding software product is, so that as the product is modularly modified, the diagnostic rule base can be modularly modified as well. The work required to generate the diagnostic rules is work that would have to be done anyway in generating the set of test cases for the modules and for the sys- tem. If it is done in a suitably general manner, with both a uniform structure for rules and a good inference engine avail- able, it may actually reduce the total labor of generating bring-up test cases, and help as well with lifelong maintenance and modification testing. In the same way, one can postulate other advisors, probably many and probably simple, for the other parts of the software-construction task. Many difficulties stand in the way of the early realization of useful expert-system advisors to the program developer. A crucial part of our imaginary scenario is the development of easy ways to get from program-structure specification to the automatic or semiautomatic generation of diagnostic rules. Even more difficult and ER I April 1987 important is the twofold task of knowl- edge acquisition: finding articulate, self- analytical experts who know why they do things, and developing efficient tech- niques for extracting what they know and distilling it into rule bases. The essential prerequisite for building an expert system is to have an expert. The most powerful contribution by ex- pert systems will surely be to put at the ser- vice of the inexperienced programmer the experience and accumulated wisdom of the best programmers. This is no small contribution. The gap between the best software engineering practice and the average practice is very wide-perhaps wider than in any other engineering discipline. A tool that disseminates good practice would be important. "Automatic" programming. For almost 40 years, people have been anticipating and writing about "automatic program- ming," or the generation of a program for solving a problem from a statement of the problem specifications. Some today write as if they expect this technology to provide the next breakthrough.5 Parnas4 implies that the term is used for glamor, not for semantic content, asserting, In short, automatic programming always has been a euphemism for program- ming with a higher-level language than was presently available to the programmer. He argues, in essence, that in most cases it is the solution method, not the problem, whose specification has to be given. One can fmd exceptions. The technique of building generators is very powerful, and it is routinely used to good advantage in programs for sorting. Some systems for integrating differential equations have also permitted direct specification of the problem, and the systems have assessed the parameters, chosen from a library of methods of solution, and generated the programs. These applications have very favorable properties: ? The problems are readily charac- terized by relatively few parameters. ? There are many known methods of solution to provide a library of alter- natives. ? Extensive analysis has led to explicit rules for selecting solution techniques, given problem parameters. It is. hard to see how such techniques generalize to the wider world of the or- dinary software system, where cases with such neat properties are the exception. It is hard even to imagine how this break- through in generalization could occur. Graphical programming. A favorite subject for PhD dissertations in software engineering is graphical, or visual, pro- gramming-the application of computer graphics to software design. 6,7 Sometimes the promise held out by such an approach is postulated by analogy with VLSI chip design, in which computer graphics plays so fruitful a role. Sometimes the theorist justifies the approach by considering flowcharts as the ideal program-design medium and by providing powerful facilities for constructing them. Nothing even convincing, much less ex- citing, has yet emerged from such efforts. I am persuaded that nothing will. In the first place, as I have argued elsewhere, 8 the flowchart is a very poor abstraction of software structure. Indeed, it is best viewed as Burks, von Neumann, and Goldstine's attempt to provide a desperately needed high-level control lan- guage for their proposed computer. In the pitiful, multipage, connection-boxed form to which the flowchart has today been elaborated, it has proved to be useless as a design tool- program- mers draw Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 flowcharts after, not before, writing the reduce me program-resung ioau, n taiuvt programs they describe. eliminate it. Second, the screens of today are too More seriously, even perfect program small, in pixels, to show both the scope verification can only establish that a pro- and the resolution of any seriously detailed gram meets its specification. The hardest software diagram. The so-called "desktop part of the software task is arriving at a metaphor" of today's workstation is in- complete and consistent specification, and stead an "airplane-seat" metaphor. Any- much of the essence of building a program one who has shuffled a lap full of papers is in fact the debugging of the specification. while seated between two portly passen- gers will recognize the difference-one can see only a very few things at once. The true desktop provides overview of, and ran- dom access to, a score of pages. Moreover, when fits of creativity run strong, more than one programmer or writer has been known to abandon the desktop for the more spacious floor. The hardware tech- nology will have to advance quite substan- tially before the scope of our scopes is suf- ficient for the software-design task. More fundamentally, as I have argued above, software is very difficult to visualize. Whether one diagrams control flow, variable-scope nesting, variable cross-references, dataflow, hierarchical data structures, or whatever, one feels only one dimension of the intricately in- terlocked software elephant. If one superimposes all the diagrams generated by the many relevant views, it is difficult to extract any global overview. The VLSI analogy is fundamentally misleading-a chip design is a layered two-dimensional description whose geometry reflects its realization in 3-space. A software system is not. Program verification. Much of the ef- fort in modern programming goes into testing and the repair of bugs. Is there perhaps a silver bullet to be found by eliminating the errors at the source, in the system-design phase? Can both productiv- ity and product reliability be radically enhanced by following the profoundly dif- ferent strategy of proving designs correct before the immense effort is poured into implementing and testing them? I do not believe we will find productivity magic here. Program verification is a very powerful concept, and it will be very im- portant for such things as secure operat- ing-system kernels. The technology does not promise, however, to save labor. Veri- fications are so much work that only a few substantial programs have ever been verified. Program verification does not mean error-proof programs. There is no magic here, either. Mathematical proofs also can be faulty. So whereas verification might Environments and tools. How much more gain can be expected from the ex- ploding researches into better program- ming environments? One's instinctive reaction is that the big-payoff prob- lems-hierarchical file systems, uniform file formats to make possible uniform pro- Language-specific smart editors promise at most freedom from syntactic errors and simple semantic errors. gram interfaces, and generalized tools- were the first attacked, and have been solved. Language-specific smart editors are developments not yet widely used in practice, but the most they promise is freedom from syntactic errors and simple semantic errors. Perhaps the biggest gain yet to be real- ized from programming environments is the use of integrated database systems to keep track of the myriad details that must be recalled accurately by the individual programmer and kept current for a group of collaborators on a single system. Surely this work is worthwhile, and surely it will bear some fruit in both productivity and reliability. But by its very nature, the return from now on must be marginal. Workstations. What gains are to be ex- pected for the software art from the cer- tain and rapid increase in the power and memory capacity of the individual work- station? Well, how many MIPS can one use fruitfully? The composition and edit- ing of programs and documents is fully supported by today's speeds. Compiling could stand a boost, but a factor of 10 in machine speed would surely leave think- time the dominant activity in the program- mer's day. Indeed, it appears to be so now. More powerful workstations we surely welcome. Magical enhancements from them we cannot expect. CIA-RDP90G01353R000200180023-0 rr0MJL5Uig d(t ..i a Val. conceptual essence Even though no technological breakthrough promises to give the sort of magical results with which we are so fami- liar in the hardware area, there is both an abundance of good work going on now, and the promise of steady, if unspecta- cular progress. All of the technological attacks on the accidents of the software process are fundamentally limited by the productivity equation: time of task = (frequency) i x (time) ; If, as I believe, the conceptual compo- nents of the task are now taking most of the time, then no amount of activity on the task components that are merely the ex- pression of the concepts can give large productivity gains. Hence we must consider those attacks that address the essence of the software problem, the formulation of these com- plex conceptual structures. Fortunately, some of these attacks are very promising. Buy versus build. The most radical possible solution for constructing soft- ware is not to construct it at all. Every day this becomes easier, as more and more vendors offer more and better software products for a dizzying variety of applications. While we software engineers have labored on production methodology, the personal-computer revolution has created not one, but many, mass markets for software. Every newsstand carries monthly magazines, which sorted by machine type, advertise and review dozens of products at prices from a few dollars to a few hundred dollars. More specialized sources offer very powerful products for the workstation and other Unix markets. Even software tools and environments can be bought off-the-shelf. I have elsewhere proposed a marketplace for individual modules. 9 Any such product is cheaper to buy than to build afresh. Even at a cost of one hun- dred thousand dollars, a purchased piece of software is costing only about as much as one programmer-year. And delivery is immediate! Immediate at least for prod- ucts that really exist, products whose de- veloper can refer products to a happy user. Moreover, such products tend to be much better documented and somewhat better maintained than home-grown software. Declassified in Part - Sanitized Copy Approved for Release 2012/07/02: CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 in a- ::e :h is d- le- :r. ch :er The development of the mass market is, I believe, the most profound long-run trend in software engineering. The cost of software has always been development cost, not replication cost. Sharing that cost among even a few users radically cuts the per-user cost. Another way of looking at it is that the use of n copies of a software system effectively multiplies the produc- tivity of its developers by n. That is an enhancement of the productivity of the discipline and of the nation. The key issue, of course, is applicabil- ity. Can I use an available off-the-shelf package to perform my task? A surprising thing has happened here. During the 1950's and 1960's, study after study showed that users would not use off-the- shelf packages for payroll, inventory con- trol, accounts receivable, and so on. The requirements were too specialized, the case-to-case variation too high. During the 1980's, we find such packages in high demand and widespread use. What has changed? Not the packages, really. They may be somewhat more generalized and some- what more customizable than formerly, but not much. Not the applications, either. If anything, the business and scien- tific needs of today are more diverse and complicated than those of 20 years ago. The big change has been in the hard- ware/software cost ratio. In 1960, the buyer of a two-million dollar machine felt that he could afford $250,000 more for a customized payroll program, one that slipped easily and nondisruptively into the computer-hostile social environment. To- day, the buyer of a $50,000 office machine cannot conceivably afford a customized payroll program, so he adapts the payroll procedure to the packages available. Com- puters are now so commonplace, if not yet so beloved, that the adaptations are ac- cepted as a matter of course. There are dramatic exceptions to my argument that the generalization of soft- ware packages has changed little over the years: electronic spreadsheets and simple database systems. These powerful tools, so obvious in retrospect and yet so late in appearing, lend themselves to myriad uses, some quite unorthodox. Articles and even books now abound on how to tackle unexpected tasks with the spreadsheet. Large numbers of applications that would formerly have been written as custom pro- grams in Cobol or Report Program Gener- ator are now routinely done with these tools. Many users now operate their own com- puters day in and day out on various ap- plications without ever writing a program. Indeed, many of these users cannot write new programs for their machines, but they are nevertheless adept at solving new prob- lems with them. I believe the single most powerful soft- ware-productivity strategy for many or- ganizations today is to equip the computer-naive intellectual workers who are on the firing line with personal com- puters and good generalized writing, drawing, file, and spreadsheet programs and then to turn them loose. The same strategy, carried out with generalized mathematical and statistical packages and some simple programming capabilities, will also work for hundreds of laboratory scientists. Requirements refinement and rapid prototyping. The hardest single part of building a software system is deciding precisely what to build. No other part of the conceptual work is as difficult as establishing the detailed technical re- quirements, including all the interfaces to people, to machines, and to other software systems. No other part of the work so crip- ples the resulting system if done wrong. No other part is more difficult to rectify later. Therefore, the most important function that the software builder performs for the client is the iterative extraction and refine- ment of the product requirements. For the truth is, the client does not know what he wants. The client usually does not know what questions must be answered, and he has almost never thought of the problem in the detail necessary for specification. Even the simple answer-"Make the new software system work like our old manual information-processing system" -is in fact too simple. One never wants exactly that. Complex software systems are, problems Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 moreover, things that act, that move, that work. The dynamics of that action are hard to imagine.,So in planning any soft- ware-design activity, it is necessary to allow for an extensive iteration between the client and the designer as part of the system definition. I would go a step further and assert that it is really impossible for a client, even working with a software engineer, to specify completely, precisely, and correct- ly the exact requirements of a modern soft- ware product before trying some versions of the product. Therefore, one of the most promising of the current technological efforts, and one that attacks the essence, not the accidents, of the software problem, is the devel- opment of approaches and tools for rapid prototyping of systems as prototyping is part of the iterative specification of requirements. A prototype software system is one that simulates the important interfaces and performs the main functions of the in- tended system, while not necessarily being bound by the same hardware speed, size, or cost constraints. Prototypes typically perform the mainline tasks of the applica- tion, but make no attempt to handle the exceptional tasks, respond correctly to in- valid inputs, or abort cleanly. The purpose of the prototype is to make real the con- ceptual structure specified, so that the client can test it for consistency and usability. Much of present-day software-acquisi- tion procedure rests upon the assumption that one can specify a satisfactory system in advance, get bids for its construction, have it built, and install it. I think this assumption is fundamentally wrong, and that many Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 spring from that fallacy. Hence, they can- not be fixed without fundamental revi- sion-revision that provides for iterative development and specification of pro- totypes and products. Incremental development-grow, don't build, software. I still remember the jolt I felt in 1958 when I first heard a friend talk about building a program, as opposed to writing one. In a flash he broadened my whole view of the software process. The metaphor shift was powerful, and accu- rate. Today we understand how like other building processes the construction of software is, and we freely use other elements of the metaphor, such as specifi- cations, assembly of components, and scaffolding. The building metaphor has outlived its usefulness. It is time to change again. If, as I believe, the conceptual structures we construct today are too complicated to be specified accurately in advance, and too complex to be built faultlessly, then we must take a radically different approach. Let us turn to nature and study com- plexity in living things, instead of just the dead works of man. Here we find con- structs whose complexities thrill us with awe. The brain alone is intricate beyond mapping, powerful beyond imitation, rich in diversity, self-protecting, and self- renewing. The secret is that it is grown, not built. So it must be with our software systems. Some years ago Harlan Mills proposed that any software system should be grown by incremental development. 10 That is, the system should first be made to run, even if it does nothing useful except call the proper set of dummy subprograms. Then, bit by bit, it should be fleshed out, with the subprograms in turn being devel- oped-into actions or calls to empty stubs in the level below. I have seen most dramatic results since I began urging this technique on the project builders in my Software Engineering Laboratory class. Nothing in the past decade has so radically changed my own practice, or its effectiveness. The ap- proach necessitates top-down design, for it is a top-down growing of the software. It allows easy backtracking. It lends itself to early prototypes. Each added function and new provision for more complex data or circumstances grows organically out of what is already there. The morale effects are startling. En- thusiasm jumps when there is a running system, even a simple one. Efforts re- Table1.1FrdtIn ;i. unexciting software double when the first picture from a new graphics software system appears on the screen, even if it is only a rectangle. One always has, at every stage in the process, a working system. I find that teams can grow much more complex entities in four months than they can build. The same benefits can be realized on large projects as on my small ones. I I Great designers. The central question in how to improve the software art centers, as it always has, on people. We can get good designs by following good practices instead of poor ones. Good design practices can be taught. Program- mers are among the most intelligent part of the population, so they can learn good practice. Hence, a major thrust in the United States is to promulgate good modern practice. New curricula, new literature, new organizations such as the Software Engineering Institute, all have come into being in order to raise the level of our practice from poor to good. This is entirely proper. Nevertheless, I do not believe we can make the next step upward in the same way. Whereas the difference between poor conceptual designs and good ones may lie in the soundness of design method, the difference between good designs and great ones surely does not. Great designs come from great designers. Software construc- tion is a creative process. Sound methodology can empower and liberate the creative mind; it cannot inflame or inspire the drudge. The differences are not minor-they are rather like the differences between Salieri and Mozart. Study after study shows that the very best designers produce structures that are faster, smaller, simpler, cleaner, and produced with less effort. 12 The dif- be great and the average of magnitude. ospection shows that useful software sys- of multipart projects, stems that have excited ui of saeyf u are those that are the prod- ucts of one of few designing minds, great designers. C~gt1 Unix, APL, Pascal, Modula,' the Ssnaftalk interface, even Fortran; and contrast them with Cobol, PL/I, Algol, MVS/370, and MS-DOS. (See Table 1.) Hence, although I strongly support the technology-transfer and curriculum-de- velopment efforts now under way, I think the most important single effort we can mount is to develop ways to grow great designers. No software organization can ignore this challenge. Good managers, scarce though they be, are no scarcer than good designers. Great designers and great managers are both very rare. Most organizations spend considerable effort in finding and cultivating the management prospects; I know of none that spends equal effort in finding and developing the great designers upon whom the technical excellence of the products will ultimately depend. My first proposal is that each software organization must determine and pro- claim that great designers are as important to its success as great managers are, and that they can be expected to be similarly nurtured and rewarded. Not only salary, but the perquisites of recognition-office size, furnishings, personal technical equip- ment, travel funds, staff support-must be fully equivalent. How to grow great designers? Space does not permit a lengthy discussion, but some steps are obvious: ? Systematically identify top designers as early as possible. The best are often not the most experienced. ? Assign a career mentor to be respon- sible for the development of the prospect, and carefully keep a career file. ? Devise and maintain a career-devel- opment plan for each prospect, including carefully selected apprenticeships with top designers, episodes of advanced formal education, and short courses, all inter- spersed with solo-design and technical- leadership assignments. - ? Provide opportunities for growing designers to interact with and stimulate each other.0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 =rs tot el- ing op nal .er- :al- ing :ate Acknowledgments I thank Gordon Bell, Bruce Buchanan, Rick Hayes-Roth, Robert Patrick, and, most especially, David Parnas for their insights and stimulating ideas, and Rebekah Bierly for the technical production of this article. References artificial intelligence and software engi- neering), J. Mostow, guest ed., Vol. 11, No. 11, Nov. 1985, pp. 1257-1267. 6. Computer (special issue on visual pro- gramming), R.B. Graphton and T. Ichikawa, guest eds., Vol. 18, No. 8, Aug. 1985. 7. G. Raeder, "A Survey of Current Graphical Programming Techniques," Computer (special issue on visual pro- gramming), R.B. Graphton and T. Ichikawa, guest eds., Vol. 18, No. 8, Aug. 1985, pp. 11-25. 8. F.P. Brooks, The Mythical Man-Month, I. D.L. Parnas, "Designing Software for 1975, Addison-Wesley, Reading, Mass., New York, Chapter 14. Ease of Extension and Contraction," 9. Defense Science Board, Report of the IEEE Trans. Software Engineering, Vol. Task Force on Military Software, in press. No. 2 Mar. 1979 pp. 128-138. 5 , , , 10. H.D. Mills, "Top-Down Programming in 2. G. Booch, "Object-Oriented Design," Large Systems " in Debugging Tech- Software Engineering with Ada, 1983, , niques in Large Systems, R. Ruskin, ed., Benjamin/Cummings, Menlo Park, Prentice-Hall, Englewood Cliffs, N.J., Calif. 1971. 3. IEEE Trans. Software Engineering 11. B.W. Boehm, "A Spiral Model of (special issue on artificial intelligence and Software Development and Enhance- software engineering), J. Mostow, guest ment," 1985, TRW tech. report ed., Vol. 11, No. 11, Nov. 1985. 21-371-85, TRW, Inc., 1 Space Park, 4. D.L. Parnas, "Software Aspects of Redondo Beach, CA 90278. Strategic Defense Systems," American 12. H. Sackman, W.J. Erikson, and E.E. Scientist, Nov. 1985. Grant, "Exploratory Experimental 5. R. Balzer, "A 15-Year Perspective on Studies Comparing Online and Offline Automatic Programming," IEEE Trans. Programming Performance," CA CM, Software Engineering (special issue on Vol. II, No. 1, Jan. 1968, pp. 3-11. DIRECTOR UNIVERSITY COMPUTER CENTER The University of Massachusetts at Amherst invites applications and nominations for the position of Direc- tor, University Computing Center, a position beginning September 1, 1987 or as soon as possible thereafter. Located in the Connecticut River Valley, UMA is a com- prehensive, public university with an enrollment of 26,000. The Director is responsible for planning and directing the overall activity of the University Computer Center, which provides instructional and research computing services to students and to faculty. Qualifications: Candidates should have experience in the management of academic or research computer ser- vices. We seek a person who understands the effective management and direction of a complex enterprise, who has demonstrated leadership ability, and who can work well with peers in planning and negotiation. Doctorate and faculty experience preferred. Salary commensurate with qualifications and experience. Deadline for applications is April 22, 1987. Letters of ap- plication should include a current resume, a brief state- ment of qualifications for the position, and the names, addresses, and telephone numbers of at least three refer- ences who are familiar with the applicant's professional experience. Applications should be sent to: Charles Moran, Chair, UCC Director Search Committee Office of Computing and Information Systems 362 Whitmore Administration Building University of Massachusetts Amherst, MA 01003 The University of Massachusetts Is an Affirmative Action/Equal Opportunity Employer. B BD Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Frederick P. Brooks is Kenan Professor of Computer Science at the University of North Carolina in Chapel Hill. He is best known as the "father of the IBM System/360 computer fam- ily," having served as project manager for the System/360 hardware and later as project man- ager for the Operating System/360 software. At Chapel Hill, Brooks founded the UNC Dept. of Computer Science and has par- ticipated in the establishment and guiding of the Microelectronics Center of North Carolina, the Triangle Universities Computation Center, and the North Carolina Educational Computing Service. He has received the National Medal of Technology, a Guggenheim Fellowship, and the McDowell and Computer Pioneer awards of the Computer Society of the IEEE. Brooks received his PhD (in what is today computer science) from Harvard, where he was a student of Howard Aiken. Readers may write to F.P. Brooks at the University of North Carolina, Dept. of Com- puter Science, Chapel Hill, NC 27514. I/O Architects Software Professionals Performance Analysts Digital's Northeast Technology Center in Shrewsbury, Massachusetts develops mass storage systems for Digital's entire range of VAX' systems. These include memories, optical and small magnetic disks, and high speed tapes. We seek to lead the technological advancement of intelligent I/O subsystems and distributed file systems. Our Systems Group is seeking a team of profes- sionals for development of an intelligent I/O subsys- tem that provides distributed file services. We par- ticipate in architectural committees on controllers, tape loaders, buses, networks, file systems and pro- tocols. We construct performance models to aid in architectural analysis. Our software team constructs both advanced development prototypes and soft- ware products for media and resource management. A graduate degree and/or at least three years' experience are preferred. If your technical interest is in one of these areas, please send your resume to: Chris Larkin, Department 0487 7812, Digital Equipment Corporation, 333 South Street, Shrewsbury, MA 01545-4112. 'Trademark of Digital Equipment Corporation. We are an affirmative action employer. Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY DR..F.C. TOSCANO JEAN-LUC MOYAUX CORP. INFORMATION SYSTEMS IBM CORPORATION (CJ Copyright IBM Corporation 1987. All rights reserved A -121 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M OVERVIEW OBJECTIVE EXPLAIN A METHOD USED INTERNALLY BY IBM TO DEVELOP INFORMATION SYSTEMS STRATEGIES c DESCRIBE STEPS FOR A JOINT S.I.M. STUDY OUTLINE O INFORMATION SYSTEMS IN IBM STRATEGIC INVESTMENT METHODOLOGY BACKGROUND -- DESCRIBING i V S I S / N ESTMENT LINKING I/S TO BUSINESS STRATEGY o S.I.M. STUDY PLAN A -121 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 UI-v Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 IBM Organization Corporate Office l&TCS ROLM ? Information Systems Group. Corp. Finance k Planning Staffs Law & External Relations ? Credit Corp i/S and CommmdcaUo Group Corporate Operations Staffs i/S Technology Group ? NCMD ? CPD ? SWMD ? ESD ?NDD ? NSD 07/18/87326OCT1U ? SPD ? IPD 1/S and Storage Group General Counsel Americas Group Chief Scientist ? Research Europe Middle Eas Africa ? GTD, ? DSD ? Canada ? France ? STD ? GPD ? Latin America ? Germany ?UK ? Area Copyright IBM 1987 ' Corporate Business Units Asia Pacific Group ?Japan ? Southeast Asia *China ?Australia ?New Zealand Declassified in Part - Sanitized Copy Approved for Release 2012/07/02: CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 IBM Organtzalton Corporate Office 2% ROLM Corporate Operations Staffs I?TCS 21% Corp. Finance Planning Staffs Credit Corp 4;G ? CPD ? ESD ? Americas Group Chief Scientist 13% 5t 23% ? NCMD ? SWMD ? NDD ? NSD 07/1e/8752e9cr29 ? DSD ? GPD 1986 I/S EXPENDITURES Research Europe Middle East Africa ? Canada ?? ranee ? Latin America ?tt~any ? UK ? Area Copyright IBM 1987 Corporate Business Units Asia Pacific Group 'Japan ? Southeast Asia 'China 'Australia 'New Zealand Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 7;' Law & External Relations 8% i/S and Product Group General Counsel I/S Technology Group ? SPD ? GTD ? IPD ? STD Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 INFORMATION SYSTEMS IN IBM WORLD - WIDE 1984 1985 1986 I/S PERSONNEL 26.6 (THOUSANDS) 29.2 29.6 INSTALLED INVENTORY 375 (MILLION POINTS) 495 601 I/S CAPITAL ADDITIONS (BILLIONS) 1.2 1.3 I/S EXPENDITURES 2.9 (BILLIONS) 3.2 3.3 7 OF REVENUE 6.3/ 6.4/ 6.4/ 121 0 .Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 I/s DISTRIBUTION BY FUNCTION SERVICE MARKETING 1 Z% GENERAL & ADMIN. A - 121 Copyright !BM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 I/s PERSONNEL DISTRIBUTION APPLICATIONS DELIVERY PLANNING & COORDINATION Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 1000 900 800 700 P 600 E R 500 C E N 400 T 300 200 100 INTERNAL I/s GROWTH I/S EXPENSE IBM REVENUE 01 - I I I I I 1976 '78 '80 '82 '84 '86 A - 121 0 Copyright IBM 1987 210876U Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 INTERNAL I/S GROWTH 1000 I/S EQUIPMENT I/S EXPENSE IBM REVENUE I/S HEADCOUNT 1976 '78 '80 '82 '84 '86 2108751/ CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 CORPORATE I NFORMAT JO SYSTE S STRATEGY AII7E THE BUSINESS BENEFITS TO IBS OF INFORATIOW PROCESSING BY: o INTEGRATING INFORATIOM PROCESSING INTO THE BUSINESS AAIWG INFURATION PROCESSING RESOURCES EFFECTIVELY AND EFFICIENTLY o ACTIVELY SEEKING TARGETS OF OPPORTUNITY A - 121 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 VIEWS OF I/S TRADITIONAL: ACCOUNTING: MANAGEMENT PLANNING: I/S = EXPENSE 0 UP IS BAD DOWN IS GOOD ONE-YEAR BUDGET FOCUS HARDWARE = ASSET REMAINDER = EXPENSE o ACCEPTED ACCOUNTING PROCEDURES o. TAX AND P&L CONSIDERATIONS I/S = ASSET UP-FRONT INVESTMENT LONG USEFUL LIFE PERIODIC MAINTENANCE REPLACEMENT OR SCRAP A - 121 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 A MANAGEMENT TOOL TO FACILITATE DEVELOPMENT OF I/s. iNv S m STRATEGIES NT A - 121 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY BACKGROUND NOLAN NORTON'S COMPUTER EXECUTIVE SYMPOSIUM - BANK OF AMERICA IBM - DUPONT - MERRILL LYNCH - GENERAL DYNAMICS - MORGANGUARANTEE - GENERAL TELEPHONE - PHILLIPS PETROLEUM APPROACH - IDENTIFY ISSUES - DEVELOP KNOWLEDGE - PROVIDE PRACTICAL TOOLS o TOPIC: ECONOMICS OF COMPUTING - DESCRIBE I/S AS AN INVESTMENT - DEVELOP I/S INVESTMENT STRATEGIES - EVALUATE RETURN A - 121 CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY WHAT. IS S.I.M? PRACTICAL, SIMPLE TOOL TO HELP SENIOR MANAGEMENT o UNDERSTAND I/S AS AN INVESTMENT - NON-TECHNICAL - MACRO VIEW o RELATE I/S INVESTMENT TO BUSINESS STRATEGIES EVALUATE STRATEGIC IMPACT OF CHANGE - BUSINESS DIRECTIONS - I/S RESOURCE ALLOCATION COMMUNICATE WITH I/S MANAGERS 06/12/x75221 JLLS1A Copyright IBM 1987 CO Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT-METHODOLOGY KEY EVENTS .1984 - METHODOLOGY DEVELOPMENT 1985 - PILOT TESTING AND EVALUATION - SIX IBM UNITS BENEFITS AND CONSTRAINTS 1986 - INTERNAL IMPLEMENTATION PROGRAM "OPTIONAL USE" APPROACH 33 SEMINARS, 750 MANAGERS USED BY 20+ LOCATIONS APPLICABLE WHEREVER . I/S RESOURCE TRADE-OFFS EXPLICIT BUSINESS STRATEGIES CUSTOMIZED AS APPROPRIATE 1987 PILOT CUSTOMER PROGRAM oe/12/arsz21JY6Y CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 &raegLc InvesrnenE Methodology Business Strategies Objectives Segmentation . Customer Partnership Nature of I/S Products . Product Leadership Users Growth Types of Resources ? Efficiency Manageent Styles Profitability 0 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 MEASURING I/S INVESTMENT EXTENT HARDWARE o SOFTWARE o PEOPLE FACILITIES SCOPE I/S MANAGED USER MANAGED PURCHASED SERVICES Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY Development Manufacturing Marketing Support DESCRIPTION. OF I/S INVESTMENT Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 CUSTOMIZED FOR EACH STUDY USERS: WHO ARE WE INVESTING FOR? FUNCTIONAL VIEW DEVELOPMENT MANUFACTURING MARKETING SERVICE SUPPORT FUNCTION o ADDITIONAL VIEWS - JOB CLASSES - PRODUCT LINE - MARKET SEGMENT 0 0- Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 PORTFOLIO DEFINITIONS INSTITUTIONAL AUTOMATE FUNDAMENTAL BUSINESS PROCESSES OF ORGANIZATION PROFESSIONAL AUTOMATE OR SUPPORT THE INDIVIDUAL OR PROFESSIONAL DISCIPLINES ? OFFICE.SYSTEMS ? DECISION SUPPORT SYSTEMS PHYSICAL SUBSTITUTE PHYSICAL ACTIVITY WITH TECHNOLOGY EXTERNAL DIRECT. INTERFACE WITH NON-EMPLOYEES (CUSTOMERS, VENDORS,...) ? INFRASTRUCTURE INVESTMENTS AND TECHNOLOGY SHARED BY MULTIPLE PORTFOLIOS Copyright IBM 1987 A - 121 N-1.1 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 TECHN PERS OUTSIDE OTHER RESOURCES TECHNOLOGY - PROCESSORS - STORAGE - WORKSTATIONS - NETWORK MISC. PEOPLE OUTSIDE OTHER A - 121 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 MANAGEMENT APPROACH UTILITY CENTRAL MANAGEMENT OF SHARED RESOURCES Im 0818mm VENTURE MANAGEMENT OF HIGH RISK, HIGH POTENTIAL EXPERIMENTAL PROJECTS RETAIL MANAGEMENT OF WIDE DISTRIBUTION TO USERS OF LOW COST TECHNOLOGY Copyright IBM 1987 A -.121 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 MANAGEMENT APPROACH CHARACTERISTICS UTILITY o STRUCTURED MANAGEMENT SYSTEM o FORMAL PROCEDURES AND STANDARDS MEASUREMENTS AND CONTROLS FOCUS ON EFFICIENCY o MINIMIZE RISK sy TARGET: RELIABLE, LOW COST SERVICE VENTURE ENTREPRENEURIAL ENVIRONMENT EXPERIMENTAL IN NATURE FLEXIBLE MANAGEMENT SYSTEM o BUDGET-PLANNED o FOCUS ON OVERALL EFFECTIVENESS o REASONABLE RISK TAKING - TARGET: "PUNCH THROUGH" ... WILL MIGRATE RETAIL o LOW COST PER UNIT o ACCEPTED AS VALUABLE. o ACQUISITION CONTROL o INDIVIDUALLY MANAGED CENTRAL SUPPORT/MARKETING TARGET: MASS PENETRATION (C) Copyright. IBM 1987 A -121 v Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY Utility 1 S.I.M. O M3 Development Manufacturing Marketing Service Support USERS 17 DESCRIPTION OF I/S INVESTMENT O Copyright IBM 1987 rn co O C ) m Cn Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY MANAGEMENT APPROACH Utility Venture Retail Development Manufacturing Marketing Service Support CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 &raegLc Invesmen1 Methodology Business Strategies Strategic Alignment Objectives . Customer Partnership . Product Leadership 0 Growth . Efficiency ? Profitability Part 2 0 Segentation v Nature of I/S Products ? Users Types of Resources a Management Styles Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 ALIGNMENT WITH BUSINESS STRATEGIY BUSINESS STRATEGIES PORTFOLIOS S.I.M. U s E R S PORTFOLIOS S.I.M. U S E R S A - 121 Copyright IBM 1987 I/S INVESTMENT Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC ANALYSIS BUSINESS STRATEGIES 4 USER IMPACT 4 PORTFOLIO LEVERAGE I . STRATEGIC IMPORTANCE PORTFOLIOS S.I.M. V S E R S STRATEGIC TARGET AREAS ARE WE INVESTING STRATEGICALLY? PORTFOLIOS U 8 E R S I/s I NVESTMENTS A - 121 CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02: CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 S.I.M. STRATEGY LINKAGE STEP 1 - BUSINESS STRATEGIES DESCRIBE AND WEIGHT IMPORTANCE 5 = MOST 1 LEAST. EXAMPLE o GROW BUSINESS VOLUMES o SUSTAIN PROFITABILITY o ANTICIPATE DEMAND VARIATIONS WEIGHT o FACILITATE ORGANIZATIONAL FLEXIBILITY Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGY LINKAGE STEP 2. - USER IMPACT QUANTIFY IMPACT OF EACH USER 5 MOST 1 = LEAST 0 = NONE EXAMPLE STRATEGIES USERS GROWTH (4) PROFIT (5) DEMAND (1) FLEXIB. (2) MARKETING 5 4 3 3 SERVICE 3 3 2 2 ADMIN. 3 2 2 1 FINANCE 2- Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGY LINKAGE STEP 3 USERS' STRATEGIC UNITS MULTIPLY STRATEGY WEIGHT BY CORRESPONDING USER IMPACT o ADD UP FOR EACH USER EXAMPLE STRATEGY T210b72s GROWTH USERS (4) PROFIT. (5) DEMAND FLEXIB. (2) MARKETING 20 20 3 6 49 SERVICE 12 15 2 4 33 ADMIN. 12 10 2 2 26 FINANCE 8 20 1 4 33 0 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGY LINKAGE STEP 4 - PORTFOLIO LEVERAGE o QUANTIFY LEVERAGE OF EACH PORTFOLIO TYPE FOR EACH USER 5 MOST 1 = LEAST 0 = NOT APPLICABLE EXAMPLE PORTFOLIOS USERS INST PROF EXT INF MARKETING (as) 1 5 3 3 SERVICE (33) 4 2 3 3 ADMIN: (26) 5 2 2 1 FINANCE (33) 3 3 0 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGY LINKAGE STEP 5A EXAMPLE STRATEGIC IMPORTANCE MULTIPLY PORTFOLIO LEVERAGES BY CORRESPONDING USER'S STRATEGIC UNITS INST PROF EXT INF MARKETING 49 245 147 147 588 SERVICE 132 66 99 99 396 ADMIN. 130 52 52 26 260 FINANCE 99 99 0 33 231 410 462 298 305 1475 A - 121 CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGY LINKAGE STEP 5B - STRATEGIC IMPORTANCE o NORMALIZE STRATEGIC UNITS TO 100/ EXAMPLE INST PROF EXT INF MARKETING 3.3 16.6 10.0 10.0 39 .9 SERVICE 8.9 4.5 6.7 6.7. 26.8 ADMIN. 8.8 3.5 3.5 1.8 17.6 FINANCE 6.7 6.7 0.0 2.2 15.7 27.8 31.3 20.2 20.7 100 A 121 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGY LINKAGE STEP 6 .- STRATEGIC TARGET AREAS .DETERMINE CUT-OFF LEVELS o IDENTIFY "GREY CELLS" EXAMPLE INST PROF EXT INF MARKETING SERVICE 6_7 6.7 ADMIN. FINANCE 6.7 6.7 CUT-OFF LEVELS 8. 0/ 6.0/ Copyright IBM 1987 0 0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGIC ANALYSIS CURRENT I/S INVESTMENT (PERCENT) EXAMPLE PORTFOLIOS $ INST PROF EXT INF MARKETING 13.3 18.2 0 2.6 34.1 SERVICE 9.9 6.8 0 6.2 22,9 ADMIN. 18.8 11.2 0 5.8 35.8 FINANCE 5.4 0 0 1.8 7.2 47.4 36.2 0 16.4 100 OC Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGIC ANALYSIS CURRENT INVESTMENT IN "GREY CELLS" EXAMPLE PORTFOLIOS USERS MARKETING SERVICE ADMIN. FINANCE T4148701 A - 121 INST PROF 5.4 Copyright IBM 1987 EXT INF 6.2 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 S.I.M. STRATEGIC ANALYSIS DELTA MATRIX o SUBSTRACT STRATEGIC IMPORTANCE FROM I/S INVESTMENT EXAMPLE A`- 121 CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90G01353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STRATEGIC ANALYSIS CHANGE IN. BUSINESS STRATEGY OLD WEIGHT o GROWTH BUSINESS VOLUMES o SUSTAIN PROFITABILITY o ANTICIPATE DEMAND VARIATIONS o ACHIEVE ORGANIZ. FLEXIBILITY NEW WEIGHT- DELETE DELETE o OPERATE AT LEAST COST - 5 0 Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 OLD DELTA MATRIX NEW DELTA MATRIX. INST I PROF MARKETING 1 6.1 SERVICE ADMIN. FINANCE S.I.M. STRATEGIC ANALYSIS 0 -9.7 EXT Copyright IBM 1987 INF Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 LINKING I/S INVESTMENTS AND BUSINESS STRATEGIES o o CD I/s y a 70 C3 Investment C Development I , I Manufacturing r Marketing I I service I I I I Support Users A -'121 CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY STUDY STEPS TO A S.I.M. STUDY EXECUTIVE COMMITMENT o EXECUTIVE SPONSOR STUDY TEAMS APPOINTED STUDY KICK-OFF o 1 1/2 DAY SESSION, o S.I.M. TRAINING S.I.M. STUDY o ONE-WEEK PLANNING SESSION o I/S INVESTMENT STRATEGY fC Copyright IBM 1987 A-121 `/ Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY STUDY PARTICIPANTS EXECUTIVE TEAM EXECUTIVE SPONSOR SELECTED FUNCTIONAL EXECUTIVES PROJECT TEAM SENIOR MANAGERS INFORMATION SYSTEMS FINANCE BUSINESS PLANS ,KEY USER FUNCTIONS IBM MARKETING TEAM S.I.M. SPECIALIST C~ J Copyright IBM 1987 0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY STUDY AGENDA: KICK-OFF HALF-DAY: EXECUTIVE AND PROJECT TEAMS INTRODUCTION S.I.M. OVERVIEW CUSTOMER ORGANIZATION/FUNCTIONS PRELIMINARY CUSTOMIZATION OF S.I.M. MODEL ONE DAY: PROJECT TEAM ONLY DATA REQUIREMENTS 0 SOFTWARE "HANDS ON" o PROJECT PLAN PROJECT TEAM ASSIGNMENTS OC Copyright 'IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I.M. STUDY: REQUIRED INFORMATION DATA 10. BUILD UP S.I.M. FRAMEWORK: CURRENT TECHNICAL/FINANCIAL DATA BUSINESS STRATEGIES (10 - 15 MAJOR) JLM62971 A - 121 Copyright IbM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 S.I M. STRATEGY LINKAGE INPUT MAJOR BUSINESS STRATEGIES .SUPPORTING BUSINESS OBJECTIVE OBJECTIVE: WHAT TO ACHIEVE - STRATEGY HOW TO DO IT DIRECTIONAL IN NATURE AGREED-UPON BY EXECUTIVES FORMALLY DOCUMENTED OR NOT FOCUS ON 10 TO 15 KEY STRATEGIES FEWER: TOO BROAD MORE: TOO SPECIFIC CO Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 STRATEGIC INVESTMENT METHODOLOGY STUDY AGENDA: S.I.M. STUDY DAY 1 DAY 2 DAY 3 DAY 4 DAY 5 PARTICIPATION: DATA ANALYSIS AND ALLOCATION DESCRIPTION OF I/S INVESTMENT LINKAGE TO BUSINESS STRATEGIES STRATEGIC TARGET AREAS ALIGNMENT OF I/S AND BUSINESS STRATEGIES ANALYSIS OF OPPORTUNITIES I/S INVESTMENT STRATEGY RECOMMEND ACTION PLAN PREPARATION OF FINAL REPORT EXECUTIVE PRESENTATION PROJECT TEAM ALL WEEK EXECUTIVE TEAM WHERE INDICATED BY* FCT51a72 A - 121 Copyright IBM 1:87 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 FINAL S.I.M. STUDY REPORT DESCRIBE CURRENT ENVIRONMENT I/S RESOURCES BUSINESS STRATEGIES LINK I/S TO BUSINESS STRATEGIES ? IDENTIFY OPPORTUNITIES TO IMPROVE STRATEGIC ALIGNMENT EMPTY STRATEGIC TARGET AREAS NON-STRATEGIC INVESTMENTS ? RECOMMEND I/S STRATEGY NEXT STEP ... DEVELOP STRATEGIC ACTION PLAN PROJECTS RESOURCES SCHEDULES Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0 I STRATEGIC INVESTMENT METHODOLOGY HELPS SENIOR MANAGEMENT: UNDERSTAND I/S AS AN INVESTMENT - NON-TECHNICAL - MACRO VIEW o RELATE I/S INVESTMENT TO BUSINESS DIRECTIONS e RECOGNIZE OMISSION/ALIGNMENT PROBLEMS o EVALUATE STRATEGIC IMPACT OF I/S RESOURCE ALLOCATIONS Copyright IBM 1987 Declassified in Part - Sanitized Copy Approved for Release 2012/07/02 : CIA-RDP90GO1353R000200180023-0